diff options
author | Christian Borntraeger <borntraeger@de.ibm.com> | 2014-11-25 12:01:16 +0300 |
---|---|---|
committer | Christian Borntraeger <borntraeger@de.ibm.com> | 2014-12-18 11:54:36 +0300 |
commit | 230fa253df6352af12ad0a16128760b5cb3f92df (patch) | |
tree | f19ebe417d11e2874291ddbf2bb2f82ffac8705c /mm/memory.c | |
parent | 1365039d0cb32c0cf96eb9f750f4277c9a90f87d (diff) | |
download | linux-230fa253df6352af12ad0a16128760b5cb3f92df.tar.xz |
kernel: Provide READ_ONCE and ASSIGN_ONCE
ACCESS_ONCE does not work reliably on non-scalar types. For
example gcc 4.6 and 4.7 might remove the volatile tag for such
accesses during the SRA (scalar replacement of aggregates) step
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=58145)
Let's provide READ_ONCE/ASSIGN_ONCE that will do all accesses via
scalar types as suggested by Linus Torvalds. Accesses larger than
the machines word size cannot be guaranteed to be atomic. These
macros will use memcpy and emit a build warning.
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'mm/memory.c')
0 files changed, 0 insertions, 0 deletions